[1] |
王慧, 王励成, 柏雪, 等. 区块链隐私保护和扩容关键技术研究[J]. 西安电子科技大学学报, 2020, 47(5):28-39.
|
|
WANG Hui, WANG Licheng, BAI Xue, et al. Research on Key Technology of Blockchain Privacy Protection and Scalability[J]. Journal of Xidian University, 2020, 47(5):28-39.
|
[2] |
LUU L, CHU D H, OLICKEL H, el al. Making Smart Contracts Smarter[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016:254-269.
|
[3] |
LIU C, LIU H, CAO Z, et al. ReGuard:Finding Reentrancy Bugs in Smart Contracts[C]//2018 IEEE/ACM 40th International Conference on Software Engineering:Companion(ICSE-Companion). Piscataway: IEEE, 2018:65-68.
|
[4] |
TSANKOV P, DAN A, DRACHSLER-COHEN D, et al. Securify:Practical Security Analysis of Smart Contracts[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2018:67-82.
|
[5] |
AZZOPARDI S, ELLUL J, PACE G J. Monitoring Smart Contracts:Contractlarva and Open Challenges Beyond[C]//International Conference on Runtime Verification. Heidelberg:Springer, 2018:113-137.
|
[6] |
MA F, FU Y, REN M, et al. EVM*:From Offline Detection to Online Reinforcement for Ethereum Virtual Machine[C]// 2019 IEEE 26th International Conference on Software Analysis,Evolution and Reengineering(SANER). Piscataway: IEEE, 2019:554-558.
|
[7] |
WANG X, HE J, XIE Z, et al. ContractGuard:Defend Ethereum Smart Contracts with Embedded Intrusion Detection[J]. IEEE Transactions on Services Computing, 2019, 13(2):314-328.
|
[8] |
AYOADE G, BAUMAN E, KHAN L, et al. Smart Contract Defense through Bytecode Rewriting[C]//2019 IEEE International Conference on Blockchain(Blockchain). Piscataway: IEEE, 2019:384-389.
|
[9] |
ZHANG Y, MA S, LI J, et al. Smartshield:Automatic Smart Contract Protection Made Easy[C]// 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering(SANER). Piscataway: IEEE, 2020:23-34.
|
[10] |
RODLER M, LI W, KARAME G O, et al. EVMPatch:Timely and Automated Patching of Ethereum Smart Contracts[C]//30th USENIX Security Symposium(USENIX Security 21). Berkely: USENIX, 2021:1289-1306.
|
[11] |
WENZL M, MERZDOVNIK G, ULLRICH J, et al. From Hack to Elaborate Technique-A Survey on Binary Rewriting[J]. ACM Computing Surveys(CSUR), 2019, 52(3):1-37.
|
[12] |
DUCK G J, GAO X, ROYCHOUDHURY A. Binary Rewriting without Control Flow Recovery[C]//Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM, 2020:151-163.
|
[13] |
CHEN T, LI Z, ZHANG Y, et al. A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts[C]//2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement(ESEM). Piscataway: IEEE, 2019:1-11.
|
[14] |
FRANK J, ASCHENMANN C, HOLZE T. ETHBMC:A Bounded Model Checker for Smart Contracts[C]//29th USENIX Security Symposium(USENIX Security 20). Berkely: USENIX, 2020:2757-2774.
|